Hello,
I have experienced some crashes in the topoh module when someone ran a
scanner against the SIP server. Log and backtrace below (I've changed
the server ip to 192.168.31.45 intentionally).
Note: I'm not using local ip as topoh mask_ip.
version: kamailio 3.1.0 (i386/linux)
Dec 14 06:22:47 localhost /usr/local/sbin/kamailio[32348]: INFO:
<script>: [152309] REGISTER sip:abdol@192.168.31.45
From:sip:abdol@192.168.31.45,tag=6162646f6c0131323538353537353239
To:sip:abdol@192.168.31.45,tag=<null>
Call-ID:2502699686 Cseq:1 Contact:sip:abdol@192.168.31.45
<219.237.209.148:5063>
Dec 14 06:22:47 localhost /usr/local/sbin/kamailio[32347]: INFO:
<script>: [151941] REGISTER sip:abdul@192.168.31.45
From:sip:abdul@192.168.31.45,tag=616264756c01353930353937393039
To:sip:abdul@192.168.31.45,tag=<null> Call-ID:3690987863 Cseq:1
Contact:sip:abdul@192.168.31.45 <219.237.209.148:5063>
Dec 14 06:22:47 localhost /usr/local/sbin/kamailio[32341]: ALERT: <core>
[main.c:744]: core was generated
Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio.pid'.
Program terminated with signal 11, Segmentation fault.
#0 0x00dc05ac in th_skip_msg (msg=0xbfced200) at th_msg.c:1043
1043 if((get_cseq(msg)->method_id)&(METHOD_REGISTER|METHOD_PUBLISH))
(gdb) bt
#0 0x00dc05ac in th_skip_msg (msg=0xbfced200) at th_msg.c:1043
#1 0x00dc1066 in th_msg_received (data=0xbfced5fc) at topoh_mod.c:198
#2 0x080864d5 in sr_event_exec (type=1, data=0xbfced5fc) at events.c:87
#3 0x080c1a3d in receive_msg (
buf=0x8276720 "ACK sip:aarti@192.168.31.45 SIP/2.0\r\nVia:
SIP/2.0/UDP
219.237.209.148:5063;branch=z9hG4bK-2573018079;rport\r\nContent-Length:
0\r\nFrom: \"aarti\"<sip:aarti@192.168.31.45>;
tag=616172746901313238373537393"..., len=399, rcv_info=0xbfced6ec) at
receive.c:117
#4 0x0813580e in udp_rcv_loop () at udp_server.c:532
#5 0x08098f43 in main_loop () at main.c:1554
#6 0x0809b62d in main (argc=3, argv=0xbfced9b4) at main.c:2398
Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio.pid'.
Program terminated with signal 11, Segmentation fault.
#0 0x00dc05ac in th_skip_msg (msg=0xbfced200) at th_msg.c:1043
1043 if((get_cseq(msg)->method_id)&(METHOD_REGISTER|METHOD_PUBLISH))
(gdb) bt
#0 0x00dc05ac in th_skip_msg (msg=0xbfced200) at th_msg.c:1043
#1 0x00dc1066 in th_msg_received (data=0xbfced5fc) at topoh_mod.c:198
#2 0x080864d5 in sr_event_exec (type=1, data=0xbfced5fc) at events.c:87
#3 0x080c1a3d in receive_msg (
buf=0x8276720 "ACK sip:abdenace@192.168.31.45 SIP/2.0\r\nVia:
SIP/2.0/UDP
219.237.209.148:5063;branch=z9hG4bK-2970175437;rport\r\nContent-Length:
0\r\nFrom: \"abdenace\"<sip:abdenace@192.168.31.45>;
tag=616264656e61636501"..., len=422, rcv_info=0xbfced6ec) at receive.c:117
#4 0x0813580e in udp_rcv_loop () at udp_server.c:532
#5 0x08098f43 in main_loop () at main.c:1554
#6 0x0809b62d in main (argc=3, argv=0xbfced9b4) at main.c:2398
--
Sincerely,
Andrew Pogrebennyk